-
1
-
-
0038059205
-
IP traceback with deterministic packet marking
-
Apr
-
A. Belenky, and N. Ansari, "IP traceback with deterministic packet marking," IEEE Communications Letter, vol. 7, pp. 162-164, Apr. 2003
-
(2003)
IEEE Communications Letter
, vol.7
, pp. 162-164
-
-
Belenky, A.1
Ansari, N.2
-
2
-
-
4143130116
-
-
CERT Coordination Center
-
CERT Coordination Center, Denial of Service Attacks. (http://www.cert.org/tech-tips/denial-ofser-vice.html)
-
Denial of Service Attacks
-
-
-
4
-
-
0027647490
-
Random early detection gateways for congestion avoidance
-
Aug
-
S. Floyd, and V. Jacobson, "Random early detection gateways for congestion avoidance," IEEE/ACM Transactions on Networking, vol. 1, no. 4, pp. 397-413, Aug. 1993.
-
(1993)
IEEE/ACM Transactions on Networking
, vol.1
, Issue.4
, pp. 397-413
-
-
Floyd, S.1
Jacobson, V.2
-
6
-
-
84875352035
-
-
Internet Traffic Archive, BC Traces and LBL-PKT Traces
-
Internet Traffic Archive, BC Traces and LBL-PKT Traces. (http://ita.ee.lbl.gov/html/contrib/BC.html and http://ita.ee.lbl.gov/html/contrib/LBL-PKT.html)
-
-
-
-
7
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites
-
May
-
J. Jung, B. Krishnamoorthy, and M. Rabinovich, "Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites," Proceedings of 11th World Wide Web Conference, pp. 293-304, May 2002.
-
(2002)
Proceedings of 11th World Wide Web Conference
, pp. 293-304
-
-
Jung, J.1
Krishnamoorthy, B.2
Rabinovich, M.3
-
8
-
-
33646878980
-
Detecting distributed denial-of-service attacks using Kolmogorov complexity metrics
-
Mar
-
A. Kulkarni and S. Bush, "Detecting distributed denial-of-service attacks using Kolmogorov complexity metrics," Journal of Network and Systems Management, vol. 14, no. 1, Mar. 2006.
-
(2006)
Journal of Network and Systems Management
, vol.14
, Issue.1
-
-
Kulkarni, A.1
Bush, S.2
-
9
-
-
71649108583
-
Defending network-based services against denial of service attacks
-
J. Kurian and K. Sarac, "Defending network-based services against denial of service attacks," International Journal of Network Security, vol. 9, no. 2, pp. 186-200, 2009.
-
(2009)
International Journal of Network Security
, vol.9
, Issue.2
, pp. 186-200
-
-
Kurian, J.1
Sarac, K.2
-
10
-
-
71649113001
-
Towards improving an algebraic marking scheme for tracing DDoS attacks
-
M. C. Lee, Y. J. He, and Z. Chen, "Towards improving an algebraic marking scheme for tracing DDoS attacks," International Journal of Network Security, vol. 9, no. 3, pp. 204-213, 2009.
-
(2009)
International Journal of Network Security
, vol.9
, Issue.3
, pp. 204-213
-
-
Lee, M.C.1
He, Y.J.2
Chen, Z.3
-
11
-
-
27644564068
-
On prevention of the denial of service attacks: A control theoretical approach
-
West Point, New York, June
-
S. Liu, Y. Xiong and P. Sun, "On prevention of the denial of service attacks: A control theoretical approach," IEEE Systems, Man and Cybernetics, Information Assurance and Security Workshop, West Point, New York, June 2000.
-
(2000)
IEEE Systems, Man and Cybernetics, Information Assurance and Security Workshop
-
-
Liu, S.1
Xiong, Y.2
Sun, P.3
-
13
-
-
27644518127
-
D-WARD: A source-end defense against flooding denial-of-service attacks
-
July
-
J. Mirkovic, and P. Reiher, "D-WARD: A source-end defense against flooding denial-of-service attacks," IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 3, pp. 216-232, July 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 216-232
-
-
Mirkovic, J.1
Reiher, P.2
-
14
-
-
18144428108
-
-
Ph.D. Dissertation Prospectus, Computer Science Department, University of California, Los Angeles, Jan
-
J. Mirkovic, D-WARD: DDoS Network Attack Recognition and Defense, Ph.D. Dissertation Prospectus, Computer Science Department, University of California, Los Angeles, Jan. 2002.
-
(2002)
D-WARD: DDoS Network Attack Recognition and Defense
-
-
Mirkovic, J.1
-
15
-
-
77949805225
-
-
A seminar report, IIT, Guwahati, India
-
P. Mittal, Defense against Distributed Denial of Service Attacks, A seminar report, IIT, Guwahati, India, 2005.
-
(2005)
Defense against Distributed Denial of Service Attacks
-
-
Mittal, P.1
-
16
-
-
84875324073
-
-
National Laboratory for Applied Network Research, NLANR Packet Traces
-
National Laboratory for Applied Network Research, NLANR Packet Traces. (http://pma.nlanr.net/Traces/traces/long)
-
-
-
-
17
-
-
0035361712
-
Practical network for IP traceback
-
June
-
S. Savage, D.Wetherall, A. Karlin, and T. Anderson, "Practical network for IP traceback," IEEE/ACM Transactions on Networking, vol. 9, no. 3, pp. 226-237, June 2001.
-
(2001)
IEEE/ACM Transactions on Networking
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
18
-
-
2442505788
-
Towards multisensor data fusion for DoS detection
-
Nicosia, Cyprus, Mar
-
C. Siaterlis, and B. Maglaris, "Towards multisensor data fusion for DoS detection," Proceedings of SAC' 04, pp. 439-446, Nicosia, Cyprus, Mar. 2004.
-
(2004)
Proceedings of SAC' 04
, pp. 439-446
-
-
Siaterlis, C.1
Maglaris, B.2
-
19
-
-
0036947597
-
Single-packet IP traceback
-
Dec
-
A. C. Snoren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B. Schwartz, S. T. Kent, and W. T. Strayer, "Single-packet IP traceback," IEEE/ACM Transactions on Networking, vol. 10, no 6, pp. 721-734, Dec. 2002.
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.6
, pp. 721-734
-
-
Snoren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Schwartz, B.6
Kent, S.T.7
Strayer, W.T.8
-
21
-
-
15944374866
-
Pro-tection from distributed denial of service attacks using history-based filtering
-
Anchorage, Alsaka, USA, Aug
-
T. Peng, C. Leckie, and K. Ramamohanarao, "Pro-tection from distributed denial of service attacks using history-based filtering," Proceedings of ICC 2003, pp. 11-15, Anchorage, Alsaka, USA, Aug. 2003.
-
(2003)
Proceedings of ICC 2003
, pp. 11-15
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
22
-
-
0036343692
-
Detecting SYN flooding attacks
-
June
-
H. Wang, D. Zhang, and K. G. Shin, "Detecting SYN flooding attacks," Proceedings of Annual Joint Conference of IEEE Computer and Communications Societies (INFOCOM), vol. 3, pp. 1530-1539, June 2002.
-
(2002)
Proceedings of Annual Joint Conference of IEEE Computer and Communications Societies (INFOCOM)
, vol.3
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
23
-
-
33744910842
-
A novel approach for detecting DDoS attacks at an early stage
-
B. Xiao, W. Chen, and Y. He, "A novel approach for detecting DDoS attacks at an early stage," Journal on Supercomputing, vol. 36, pp. 235-248, 2006.
-
(2006)
Journal on Supercomputing
, vol.36
, pp. 235-248
-
-
Xiao, B.1
Chen, W.2
He, Y.3
|